Analyzed buffer overflow vulnerabilities in 32-bit environments — stack smashing, heap overflow, format string attacks. Evaluated ASLR and stack canary countermeasures using GDB.
Analyzed buffer overflow vulnerabilities in 32-bit environments, identifying security weaknesses.
Manipulated memory locations and return addresses to bypass execution restrictions.
Developed and tested exploit code to achieve root access via code injection and privilege escalation.
Explored stack smashing, heap overflow, and format string attacks to evaluate security risks.
Debugged and traced memory allocations using GDB, monitoring registers and stack behavior.
Conducted post-exploit analysis testing ASLR and stack protection countermeasures.
Deep-dive into memory exploitation in controlled 32-bit Linux environments.
%n to write to arbitrary memory locationsASLR significantly raises the difficulty but does not prevent exploitation when combined with information leaks that reveal base addresses.
This lab reinforced and extended my Ethical Hacking Essentials certification curriculum.